About Us

News and Events

Posts by
Teresa Chen

Teresa is Director of Product Marketing at Centrify, focusing on Centrify’s Identity Service. She has over 15+ years of product and solution marketing, channel marketing and product management experience from various enterprise software companies. Teresa earned her MBA from Santa Clara University and her BSE from University of Michigan, Ann Arbor.

While phishing attacks continue to jeopardize today’s organizations (a reported 76% of organizations experienced phishing attacks in 2017), it was refreshing to hear that tech giant Google has apparently eliminated phishing by giving security keys to all of its 85,000 employees. “We have had no reported or confirmed account takeovers since implementing security keys at Google,” a company spokesperson told Krebs on Security last week. “Users might be asked to authenticate using their security key for many different apps/reasons. It all depends on the sensitivity of the app and the risk of the user at that point in time.” This…

We’ve heard it time and again. As security threats increase and morph, and user devices and locations diversify, multi-factor authentication (MFA) should be blossoming into a trusted method for preventing misuse. Experts have consistently stated that enterprises need to implement protections at vulnerable points and apply effective access security mechanisms such as MFA. So, what’s the deal? The Deloitte and Uber breaches, both incidents which took place last fall, demonstrated that these episodes were aided by the lack of MFA. These proof points alone should in fact create an urgency in MFA implementation and usage within organizations! Then… why haven’t…

Yes, you read it correctly. Centrify, the only identity services provider to be evaluated in and positioned as a leader in both The Forrester Wave™: Identity-As-A-Service, Q4 2017 and The Forrester Wave™: Privileged Identity Management, Q3 2016 has also been identified by Forrester as a Strong Performer in The Forrester Wave™: Enterprise Mobility Management, Q4 2017. A complimentary version of this report is available for download here. Centrify received the highest possible scores in the product vision and mobile identity and access criteria. According to Forrester, “Centrify was the first vendor in the EMM market to unite IDaaS with mobility management…

Cloud based services dominate today’s world and over the past few years, delivering cloud based IAM solutions is no exception. The right solution can reduce risk, cut down costs and save time, but choosing the right IDaaS vendor requires careful consideration. Putting together some basic questions to ask while covering several key elements is a first step. So…where do we begin? Is It a True Hybrid Solution? Ask your prospective vendor if they truly provide a hybrid solution with control and access across on-premises and SaaS-based applications. Federation for SaaS apps is a great first step, but larger companies will…

PC Magazine recently published a review of the top 2017 Identity Management Solutions and we are pleased to announce that Centrify was one of only three vendors that received the Editors’ Choice Award! The Editors’ Choice is awarded annually to products/services that rise above similar products in their categories and the products under consideration have been reviewed by expert analysts in PCMag Labs. Specific features that were commended by PC Magazine were capabilities such as robust reporting, easy to use on-premises app, quick integration with user identities from social networks, and our risk-based authentication that leverages machine learning. Our user…

Centrify CEO Tom Kemp, an industry expert in security and infrastructure software, discusses market and technology issues around the disruption occurring in the Identity and Access Management market due to the cloud, mobile and consumerization of IT trends occurring in today's IT environment.